User Guide
Page 7
... over the airwaves, you can access your wireless network. Enable MAC address filtering Linksys routers give you need to take some older devices that only those computers can specify the MAC address of numbers and letters assigned to every networking device. Wireless-N Broadband Router Wireless Security Checklist 4. Change the default wireless network name or SSID Wireless devices have a default password...
... over the airwaves, you can access your wireless network. Enable MAC address filtering Linksys routers give you need to take some older devices that only those computers can specify the MAC address of numbers and letters assigned to every networking device. Wireless-N Broadband Router Wireless Security Checklist 4. Change the default wireless network name or SSID Wireless devices have a default password...
User Guide
Page 9
...how often you want to 8 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to specify here. •• Subnet Mask This is the Router's IP address, as seen by users on Demand. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP). Default ... (including your ISP to cut the Internet connection after it has been inactive for a specified period of minutes you want the Router to access the Internet again. The default Max Idle Time is 30 seconds. Then configure the following: •• Specify an IP ...
...how often you want to 8 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to specify here. •• Subnet Mask This is the Router's IP address, as seen by users on Demand. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP). Default ... (including your ISP to cut the Internet connection after it has been inactive for a specified period of minutes you want the Router to access the Internet again. The default Max Idle Time is 30 seconds. Then configure the following: •• Specify an IP ...
User Guide
Page 20
... Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the method used to implement secure exchange of packets at the IP layer. Wireless-N Broadband Router Summary 19
... Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the method used to implement secure exchange of packets at the IP layer. Wireless-N Broadband Router Summary 19